User login

Matt Hunter's blog

05

Jul

2013

This week I spent copying some of my hard copy paper flow chart documentation to digital versions

I also compiled a list of possible security vulnerabilities in cloud services and prioritised them.

Finally I began working on my presentation to give to the Comp520 Class this wednesday

28

Jun

2013

This week i began automated testing of cloud services with the use of my automation script ive been writing for the past few weeks.

I also began looking at session Id analysis

And finally i started (but didnt get very far) formally writing down what I've discovered in anticipation of my final report

07

Jun

2013

No honours work this week. Trying to get 560 and the FPGA board working properly

10

May

2013

Just about completed script for automatically scanning a cloud service for vulnerabilities

03

May

2013

This week I began the creating an automatic script to test cloud software for vulnerablilities. Although It is not yet finished I don't invisage it taking to much longer

01

Apr

2013

This week i continued to investigate the data structures used to transfer infomation between the cloud and the client. As well as looking at client side javascript cloud services use to make their services work

22

Mar

2013

This week I began to look at cloud computing's data processing both server side and client side, to gain an appreciation of how it works. I also completed a simple flow chart and table to help me further understand the structures used to present cloud computing to users.

15

Mar

2013

This week a large amount of my time was spent on the proposal and other projects,

However I did manage to investigate datatransfers for cloud storage systems.

08

Mar

2013

The first half of this week I was exploring different tools that can be used for my project. Some of these tools included the tor browser for anonymity, a large range of Firefox add-ons preforming a range of functions such httpfox for viewing and modifying cookies and params submitted by the browser, and some low level network tools such as netcat and openssl for writing scripts to interact with the drive webservers through http requests on the command line.

The Second half of the week I began to scope my target google drive, I began collating the structure of the site, with infomation such as the urls and parameters used, as well as further research into web specific attacking techniques such as Cookie "Bit diddling"(Real term from Hacking Web Applications Exposed)